0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,347)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Introduction to Certificateless Cryptography (Hardcover): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Hardcover)
Hu Xiong, Zhen Qin, Athanasios V Vasilakos
R2,406 Discovery Miles 24 060 Ships in 12 - 17 working days

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Foundations of Coding - Compression, Encryption, Error Correction (Hardcover): JG Dumas Foundations of Coding - Compression, Encryption, Error Correction (Hardcover)
JG Dumas
R2,541 R2,050 Discovery Miles 20 500 Save R491 (19%) Out of stock

Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension. * Explains how to structure coding information so that its transmission is safe, error-free, efficient, and fast * Includes a pseudo-code that readers may implement in their preferential programming language * Features descriptive diagrams and illustrations, and almost 150 exercises, with corrections, of varying complexity to enhance comprehension Foundations of Coding: Compression, Encryption, Error-Correction is an invaluable resource for understanding the various ways information is structured for its secure and reliable transmission in the 21st-century world.

Multimedia Content Encryption - Techniques and Applications (Hardcover): Shiguo Lian Multimedia Content Encryption - Techniques and Applications (Hardcover)
Shiguo Lian
R3,324 Discovery Miles 33 240 Ships in 12 - 17 working days

"How to Design a Secure Multimedia Encryption Scheme"


The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: "Techniques and Applications" presents the latest research results in this dynamic field.

Examines the Latest Encryption Techniques

The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage.

Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect theintegrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

Testing Code Security (Hardcover): Maura A. van der Linden Testing Code Security (Hardcover)
Maura A. van der Linden
R2,768 Discovery Miles 27 680 Ships in 12 - 17 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Securing Windows NT/2000 - From Policies to Firewalls (Paperback): Michael A. Simonyi Securing Windows NT/2000 - From Policies to Firewalls (Paperback)
Michael A. Simonyi
R2,767 Discovery Miles 27 670 Ships in 12 - 17 working days

In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.

The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.

Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.

About the Author:

Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.

The Business of Cybersecurity - Foundations and Ideologies (Paperback): Ashwini Sathnur The Business of Cybersecurity - Foundations and Ideologies (Paperback)
Ashwini Sathnur
R615 R503 Discovery Miles 5 030 Save R112 (18%) Ships in 10 - 15 working days

Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security. This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.

Multimedia Watermarking Techniques and Applications (Hardcover): Darko Kirovski Multimedia Watermarking Techniques and Applications (Hardcover)
Darko Kirovski
R3,481 Discovery Miles 34 810 Ships in 12 - 17 working days

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.

The HIPAA Compliance Kit - Understanding and Applying the Regulations in Psychotherapeutic Practice (CD-ROM, 3rd Revised... The HIPAA Compliance Kit - Understanding and Applying the Regulations in Psychotherapeutic Practice (CD-ROM, 3rd Revised edition)
Ofer Zur
R1,551 R1,438 Discovery Miles 14 380 Save R113 (7%) Out of stock

New medical privacy rules (HIPAA) are having a profound impact on all medical practices. In an easy-to-follow Q&A format based on his sold-out courses, Ofer Zur addresses over one hundred questions about these often-confusing regulations, including: What are the basic requirements for compliance? How is therapist-patient privacy protected? Do managed care companies have a right to review my notes? Can I say the name of my patient in my waiting room? What do I need to know regarding my phone?A CD-ROM is included, providing you with simple checklists and ready-to-apply HIPAA forms that you will be able to personalist and utilize in your practice.

The FBI Story 2017 (Paperback): Federal Bureau of Investigation (U S ), Justice Dept (U S ) The FBI Story 2017 (Paperback)
Federal Bureau of Investigation (U S ), Justice Dept (U S )
R849 Discovery Miles 8 490 Out of stock
Cryptography for Developers 2016 (Paperback): Jose Estevez Cryptography for Developers 2016 (Paperback)
Jose Estevez
R877 R812 Discovery Miles 8 120 Save R65 (7%) Out of stock

Cryptography for Developers gives developers the practical cryptographic tools they need in their daily work. It also provides them the contextual knowledge to understand how these 21st-century cryptographic tools have been fashioned in response to theoretical and technological advances in mathematics and computers that rendered the paradigms of classic and late 20th-century cryptography obsolete. The book focuses on the recipes for algorithms most commonly deployed by developers in practical applications, without delving into the details of the mathematical theory underlying them. The technical presentation of each algorithm in code is accompanied by a narrative account of the algorithm's applications and historical development. Depending on the reader's interest level, Cryptography for Developers may be read in its entirety or in its thematic parts, either as a technical manual of algorithms or as an introductory survey of modern cryptography. The technical heart of Cryptography for Developers describes cryptographic algorithms in current use, explains how they work and how to use them, and provides abundant practical examples from the libraries of popular programming languages, including Ruby, Java, C, PHP, JavaScript, Python, and Perl. Software architect Jose Maria Estevez proceeds to demonstrate with plentiful examples the protocols for combining algorithms and the methods for solving cryptographic problems commonly encountered by developers. The narrative portion of the book surveys the development of classical cryptography from ancient Athens through World War II, the computerization of cryptography in the second half of the 20th century, the explosive growth and proliferation of modern cryptography since the turn of the 21st century, and the forecast for future cryptographic developments driven by quantum computing and other technological and social trends.

Encyclopedia of Cryptography and Security (Hardcover): Henk C.A. van Tilborg Encyclopedia of Cryptography and Security (Hardcover)
Henk C.A. van Tilborg
R10,808 Discovery Miles 108 080 Out of stock

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A--Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification Block ciphers and stream ciphers Computational issues Copy protection Cryptanalysis and security Cryptographic protocols Electronic payment and digital certificates Elliptic curve cryptography Factorization algorithms and primality tests Hash functions and MACs Historical systems Identity-based cryptography Implementation aspects for smart cards and standards Key management Multiparty computations like voting schemes Public key cryptography Quantum cryptography Secret sharing schemes Sequences Web security The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.

Principles of Database Query Processing for Advanced Applications (Paperback): Clement T. Yu, Weiyi Meng Principles of Database Query Processing for Advanced Applications (Paperback)
Clement T. Yu, Weiyi Meng
R3,027 Discovery Miles 30 270 Out of stock

The aim of query processing is to find information in one or more databases and deliver it to the user quickly and efficiently. Traditional techniques work well for databases with standard, single-site relational structures, but databases containing more complex and diverse types of data demand new query processing and optimization techniques. Most real-world data is not well structured. Today's databases typically contain much non-structured data such as text, images, video, and audio, often distributed across computer networks. In this complex milieu (typified by the world wide Web), efficient and accurate query processing becomes quite challenging. Principles of Database Query Processing for Advanced Applications teaches the basic concepts and techniques of query processing and optimization for a variety of data forms and database systems, whether structured or unstructured.

Security and Survivability - Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems (Hardcover, 2., ??Berarb.... Security and Survivability - Analyzing, Modeling, and Verifying Dynamic Recovery in Insecure Systems (Hardcover, 2., ??Berarb. A)
Roy H. Campbell, Prasad G. Naldurg
R2,029 Discovery Miles 20 290 Out of stock

Security and Survivability presents new research on the emerging discipline of design and analysis of security systems that are survivable. Such systems are designed to continue to provide verifiable security guarantees, and allow the system to degrade gracefully, even under threat or actual incidence of attack.

The book introduces a theory of recovery-oriented security and provides well-developed case studies that corroborate the utility of the theory, addressing privilege-escalation and Denial of Service (DoS) attacks. Using their automated verification methodology, the authors formally prove for the first time whether strategies such as selective filtering, strong authentication, and client puzzles actually reduce the vulnerability of a network to DoS attacks.

Software Security Technologies (Paperback, New edition): Richard Sinn Software Security Technologies (Paperback, New edition)
Richard Sinn
R1,774 R1,559 Discovery Miles 15 590 Save R215 (12%) Special order

Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies.

Management of Information Security (Paperback, 5th edition): Herbert Mattord, Michael Whitman Management of Information Security (Paperback, 5th edition)
Herbert Mattord, Michael Whitman
R1,382 R1,234 Discovery Miles 12 340 Save R148 (11%) Special order

Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hoe Ek Dit Onthou
Francois Van Coke, Annie Klopper Paperback R300 R219 Discovery Miles 2 190
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R301 Discovery Miles 3 010
Surfacing - On Being Black And Feminist…
Desiree Lewis, Gabeba Baderoon Paperback R395 R309 Discovery Miles 3 090
Gangster - Ware Verhale Van Albei Kante…
Carla van der Spuy Paperback R315 R229 Discovery Miles 2 290
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R395 R309 Discovery Miles 3 090
Air Fryer - Herman's Top 100 Recipes
Herman Lensing Paperback R350 R235 Discovery Miles 2 350
Imtiaz Sooliman And The Gift Of The…
Shafiq Morton Paperback  (1)
R320 R250 Discovery Miles 2 500
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R250 Discovery Miles 2 500
Man Alone - Mandela's Top Cop, Exposing…
Caryn Dolley Paperback R310 R225 Discovery Miles 2 250
Sky Guide Southern Africa 2025 - An…
Astronomical Handbook for SA Paperback R180 R139 Discovery Miles 1 390

 

Partners